Matematičeskie mašiny i sistemy最新文献

筛选
英文 中文
Methodological bases of creating electronic action plans for counteracting emergency situa-tions (P. II) 制定应对紧急情况的电子行动计划的方法基础(P.二)
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-3-38-50
A.L. Yalovets
{"title":"Methodological bases of creating electronic action plans for counteracting emergency situa-tions (P. II)","authors":"A.L. Yalovets","doi":"10.34121/1028-9763-2023-3-38-50","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-3-38-50","url":null,"abstract":"When studying the processes of counteracting emergencies, the problem of structuring these processes arises. This problem can be considered from the point of view of two levels of ab-straction: general theoretical and problem-oriented. If the general theoretical level involves the identification of general concepts and principles that underlie the planning of appropriate se-quences of operations, which together form electronic action plans, then the problem-oriented level involves taking into account the problem specifics of the emergency under study. The general theoretical level of abstraction of the problem of structuring counteraction processes was considered in the first part of the methodological bases for creating electronic action plans to deal with emergencies. This article is the second part of the methodological bases, in which the problem of structuring is considered from the point of view of a problem-oriented level of abstraction. Six steps that need to be followed in the process of building an electronic action plan are outlined and analyzed. Informative examples demonstrate the features of the presenta-tion of emergency response technologies in electronic action plans. In particular, the features of representing parallel processes in electronic action plans, building components of an electronic action plan for choosing alternatives between emergency response technologies and sequential planning of a number of emergency response tasks are shown. A comparison of the proposed methodological bases with the methodological bases for creating traditional action plans is made, and significant differences in the results of applying these methodological bases when creating the corresponding action plans are demonstrated. The advantages of using electronic action plans as part of the DSS SPOR to solve the problems of operational management of emergency response in situational centers are substantiated.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135709843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convergence of the Internet of Things and situation management systems 物联网与态势管理系统的融合
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-3-89-103
O.Ye. Kovalenko
{"title":"Convergence of the Internet of Things and situation management systems","authors":"O.Ye. Kovalenko","doi":"10.34121/1028-9763-2023-3-89-103","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-3-89-103","url":null,"abstract":"Quick and accurate provision of information in the processes of situational management ac-quires special importance in the critical areas of application – the prevention and elimination of the consequences of catastrophic events, the management of military operations, medical activi-ties, the management of energy systems, etc. The goals and objectives of activities in these are-as also determine the specifics of building appropriate situation management systems for them. The functioning of such systems is based on obtaining accurate and current information about the environment in which situational management is carried out. The convergence of situation management systems with the means of wireless sensor networks (Wireless Sensor Networks, WSN) and the Internet of Things (IoT) ensures obtaining such information. The article analyzes the means of the Internet of Things from the point of view of their ability to be combined in sit-uation management systems to solve management problems in various spheres of activity. The construction features and advantages of using situational systems based on IoT in various spheres of activity are considered. The convergence of IoT in situational systems of various types requires the solution of IoT-typical tasks related to the organization of a heterogeneous network environment with controlled energy consumption and the need to process large vol-umes of data. The paper demonstrates that the scope of application determines the specific re-quirements for the construction of situation management systems, and in each specific case the system of requirements is focused on the support of a critical requirement. One of the main problems of the convergence of IoT and situation management systems is the difficulty of standardizing the operating environment. The multiplicity and variety of options for possible solutions in the development of such systems determine the need for the use of intelligent tech-nologies for the development of systems with the use of artificial intelligence and knowledge models of the target subject area.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods for the residual life assessment of corroded gas pipelines 腐蚀输气管道剩余寿命评估方法
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-3-134-150
P.D. Cespedes Garcia
{"title":"Methods for the residual life assessment of corroded gas pipelines","authors":"P.D. Cespedes Garcia","doi":"10.34121/1028-9763-2023-3-134-150","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-3-134-150","url":null,"abstract":"The article is devoted to processing the methods for the residual life assessment of pressurized gas pipelines affected by corrosion wear. The analysis of the operational viability of the facility was conducted using the analytical engineering-mechanical model ASME B31G Mod taking into account stochastic factors during defect progression. The results of these calculations were validated using programmatically implemented functions for diagnosing pipeline corrosion de-fects within the «pipenostics» function set for statistical analysis and data calculation. Applying a deterministic calculation method for corrosion rate in accordance with the API 570 standard, as well as the calculated results of the estimated failure pressure levels in accordance with the ASME B31G standard along with the associated industry document ASME B31.8, it becomes possible to obtain the failure limit value of the object based on the actual corrosion dimensions. By combining these methods, along with subsequent comprehensive calculations to predict the outcomes of the facility failure, it is possible to determine the residual life of a corroded gas pipeline. It is important to note that when applying the deterministic calculation method, most of the random physicochemical degradation processes are disregarded, and the corrosion rate is assumed to be linear, while various external factors are not taken into account. To address this issue, a probabilistic-physical approach will be applied to assess the residual life of the facility, specifically the diffusion-monotonic DM-distribution model. Within this model, the variation coefficient of the mechanochemical wear process is used as an indicator of the random variable values dispersion while according to the study results, the inspection data on corrosion depth and its calculated limit value, are selected as the parameters for assessing the corroded defec-tive area of the gas pipeline.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision-making technologies in military systems. Challenges and prospects 军事系统中的决策技术。挑战与前景
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-4-3-10
A.O. Morozov, V.O. Yashchenko
{"title":"Decision-making technologies in military systems. Challenges and prospects","authors":"A.O. Morozov, V.O. Yashchenko","doi":"10.34121/1028-9763-2023-4-3-10","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-4-3-10","url":null,"abstract":"This article examines the current aspects of the use of intelligent systems in the military sphere and their role in decision-making in crisis situations. In particular, systems such as JADE, ALPHA, and R-Plan designed to plan the deployment of armed forces, control combat aircraft, and make decisions at the operational level are analyzed. The article also describes the decision-making technology in automatic and automated control systems, as well as the state of modern military technologies. Particular attention is paid to the role of decision-making technologies in military operations, and the challenges and obstacles faced by such systems are identified. To effectively overcome these obstacles, promising directions for development and technology improvement are considered. The article provides an overview of the current state and prospects of the use of intelligent systems for decision support in the military sphere and identifies the key factors influencing their effective application. The paper discusses an innovative approach to the creation of smart autonomous robots based on the new technology of neural-like growing networks (mren-RS). Robots created using this technology function based on knowledge, associative connections, and logical inference, constantly improving their intelligence. Such robots do not require complex computing systems due to the simple structure of neural-like elements. Their high efficiency is ensured by the massive parallelism of information processing. Robots based on mren-RS can learn independently, make logical decisions, and dynamically adjust their actions. Their advantages include high intelligence, efficient power consumption, reliability, and resistance to obstacles. Such robots have the potential to become reliable assistants in solving complex problems, make a significant contribution to the development of society, and change the idea of a future civilization.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security models of the Internet of Things 物联网安全模型
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-4-43-50
O.Ye. Kovalenko
{"title":"Security models of the Internet of Things","authors":"O.Ye. Kovalenko","doi":"10.34121/1028-9763-2023-4-43-50","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-4-43-50","url":null,"abstract":"The IoT is a cyber-convergent system that includes things, means of communication, target ap-plications, and data analysis tools that support the unique identification of each object. IoT technologies play a vital role in the creation of cyber-convergent systems due to their wide us-age in various spheres of life such as industry, social sphere, health care, and creating a com-fortable environment. The IoT security model method ensures the confidentiality, integrity, and availability of data that is transferred between devices and also guarantees the privacy and secu-rity of end users. The creation and use of IoT systems directly affect the security and privacy of the involved and connected components. The presented study introduces an analysis of IoT ar-chitecture models with end-to-end security support. The conducted literature review reveals the challenges of various aspects of security faced by the IoT environment. Some models imple-menting different security strategies at different layers of the IoT are described. These include the perception layer which provides the authentication process for identifying IoT entities, the network layer which focuses on the security processes of cloud platforms, and the application layer which provides authentication and authorization for end users. The results of the analysis show that building secure IoT systems is based on three main strategies: proper configuring and ensuring the protection of all IoT devices; using secure wireless networks to connect IoT devic-es to corporate or global networks; constant situational awareness of security threats to IoT de-vices; and implementing appropriate security solutions to protect them from attacks. The ma-turity model of the IoT security system based on the ISA/IEC 62443 document package is also described.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The task of centralized management of logs in the network of situation centers of public author-ities and approaches to prototyping its software solution 介绍了公共机关态势中心网络日志集中管理的任务及其软件解决方案的原型设计方法
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-4-33-42
V.A. Lytvynov, O.M. Myakshylo, V.O. Bratskyi
{"title":"The task of centralized management of logs in the network of situation centers of public author-ities and approaches to prototyping its software solution","authors":"V.A. Lytvynov, O.M. Myakshylo, V.O. Bratskyi","doi":"10.34121/1028-9763-2023-4-33-42","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-4-33-42","url":null,"abstract":"Event logging in distributed systems is one of the most important factors for ensuring proper monitoring and management of IT systems, and the use of log information is an important area of activity of DevOps and DevSecOps teams that ensure effective interaction between develop-ers, testers, and IT security professionals. The article discusses some possible approaches to prototyping solutions for the implementation of a centralized LMS (Log Management System) in the National Network of Situation Centers of Public Authorities (SCPA). As part of the first approach, which consists in the use of ready-made market products, a review of the declared capabilities, advantages, and disadvantages of popular free open-source systems and individual LMS tools (ELK Stack, Graylog, Grafana Loki, Logstash, Fluentd, LOGalyze, Filebeat, etc.) is carried out. In the context of the formulated basic requirements for a centralized LMS, taking into account the existing experience of using the tools under consideration, the expediency of choosing solutions among two complex, full-featured systems, namely the ELK Stack (Elas-ticsearch + Logstash + Kibana complex) and the complete, self-sufficient Graylog package, is substantiated. The advantages and disadvantages of each system are considered, and the gener-alized data on the implementation of ELK – Graylog, their use and evaluation by real users, formed on the basis of materials presented by the research company Gartner, are provided. An example of the possible implementation of the second approach to creating a prototype of LMS, which consists in creating new tools, is the developed specialized system for diagnosing errors registered in log files. The structure of the system, the functions of the main components, and the results of testing in a corporate banking network are described.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key aspects of designing information infrastructure for a medical enterprise 为医疗企业设计信息基础设施的关键方面
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-3-59-64
H.T. Samoylenko, Yu.Yu. Yurchenko
{"title":"Key aspects of designing information infrastructure for a medical enterprise","authors":"H.T. Samoylenko, Yu.Yu. Yurchenko","doi":"10.34121/1028-9763-2023-3-59-64","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-3-59-64","url":null,"abstract":"The provision of necessary information for the operations of any medical institution is a com-plex and labor-intensive process aimed at addressing professional, organizational, and social challenges. Effective information support in the healthcare sector is crucial for the quality of medical services at all stages and levels, ranging from primary healthcare to online consulta-tions. This article explores the key aspects of designing an information infrastructure, including the selection of necessary technologies, system architecture development, and integration with existing medical processes. The paper delves into the process of analyzing the information ex-change and processing needs of a medical enterprise. Key requirements and functional capabili-ties of a medical information system are identified. The importance of efficient information support in medical facilities to enhance the quality of healthcare services is justified, with par-ticular emphasis on the protection of confidential medical information. Security measures such as data encryption, access control, and backup systems are considered. Additionally, practical aspects of implementing a medical information system, including requirement analysis, data protection, and staff training, are examined. The significance of developing and implementing access control systems to restrict access to medical data only to authorized personnel is high-lighted. Based on the analysis of the domain and initial customer requirements, functional and non-functional requirements for the proposed information system are formulated, and system behavior is modeled through the construction of UML diagrams and class diagrams with ac-companying specifications. Special attention is given to the development of an additional fea-ture for labeling critical patient syndromes.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automation of the inverse calculation of the atmospheric transport model as a part of a system for analyzing unknown emission sources 作为分析未知排放源系统的一部分的大气输送模式逆计算的自动化
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-4-68-80
R.O. Synkevych, S.Ya. Maistrenko, T.O. Doncov-Zagreba, K.V. Khurtsilava, I.V. Kovalets
{"title":"Automation of the inverse calculation of the atmospheric transport model as a part of a system for analyzing unknown emission sources","authors":"R.O. Synkevych, S.Ya. Maistrenko, T.O. Doncov-Zagreba, K.V. Khurtsilava, I.V. Kovalets","doi":"10.34121/1028-9763-2023-4-68-80","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-4-68-80","url":null,"abstract":"In this paper, software tools for automating the inverse calculation of the atmospheric transport model were developed as a part of the pilot version of the system for analyzing unknown sources of atmospheric pollution in the case of their detection by monitoring networks. By min-imizing the defined quality function, the probability of the source location at a certain geo-graphical point, its duration, and time of onset depending on the location, together with the vol-ume of the emission, can be analyzed. The source-receptor function is calculated by using the well-known atmospheric transport model FLEXPART in the inverse calculation mode. Auto-mated calculations of the atmospheric transport model are carried out on the Cloud Computing Platform of the Ukrainian National Grid Infrastructure by creating a virtual machine for the se-ries of FLEXPART calculations. In the future, it is planned to automate the creation and dele-tion of virtual machines performing calculations. Testing of the developed algorithms was car-ried out based on meteorological conditions during the wildfires in the Chornobyl Exclusion Zone in 2020 and data generated from measurements taken at one of the stations near Kyiv on April 18–19, 2020. During the test simulation, the coordinates of the source and the amount of Cs-137 emissions were considered unknown. Satisfactory results were obtained by comparing the estimated coordinates of the source and the volume of emissions with the corresponding real values. It is shown that the system can timely and sufficiently accurately analyze the most im-portant characteristics of possible unknown sources of atmospheric emissions. The results of the study confirm the potential importance of the obtained results for use in real-life situations and help in the identification and analysis of possible sources of radioactive contamination. The developed methods and algorithmic tools have no limitations regarding the geographical region of calculations and can be used both in the case of emissions in Ukraine and abroad.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Features of microservices architecture in e-commerce systems 电子商务系统中微服务架构的特点
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-3-51-58
H.T. Samoylenko, A.V. Selivanova
{"title":"Features of microservices architecture in e-commerce systems","authors":"H.T. Samoylenko, A.V. Selivanova","doi":"10.34121/1028-9763-2023-3-51-58","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-3-51-58","url":null,"abstract":"The development of information system architectures for e-commerce is a crucial task for busi-nesses in today's digital environment. This article presents a comparative analysis of different types of information system architectures used in e-commerce. The paper examines the specific characteristics of e-commerce and the requirements of web applications that support electronic business operations. Traditional monolithic architecture, microservices architecture, and server-less architecture have been characterized, and their advantages and disadvantages have been identified. Technological solutions in the field of e-commerce development have been studied to create an efficient and user-friendly platform. The article highlights such key architectural aspects as scalability, flexibility, deployment speed and management, reliability, and develop-ment and operational costs. The impact of each architecture type on performance and alignment with e-commerce business needs has been analyzed. This analysis will assist in the creation or modernization of information systems for e-commerce, enabling an informed choice of archi-tectural approach. The article specifically examines the advantages and disadvantages of micro-services architecture for developing e-commerce web applications, particularly using the Spring Boot framework. It explores how microservices can provide modularity and facilitate the devel-opment, deployment, and maintenance of e-commerce web applications. Such challenges of mi-croservices architecture as managing and coordinating services, as well as addressing data con-sistency and transaction management in distributed environments have been discussed. Some possible approaches and technical tools to overcome these challenges in the context of e-commerce web applications based on Spring Boot have been considered.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Residual resource of bridges and bridge structures 桥梁及桥梁结构的剩余资源
Matematičeskie mašiny i sistemy Pub Date : 2023-01-01 DOI: 10.34121/1028-9763-2023-3-151-157
N.V. Cespedes Garcia
{"title":"Residual resource of bridges and bridge structures","authors":"N.V. Cespedes Garcia","doi":"10.34121/1028-9763-2023-3-151-157","DOIUrl":"https://doi.org/10.34121/1028-9763-2023-3-151-157","url":null,"abstract":"The article is devoted to the definition of current methods of assessing the residual resource of bridges and bridge structures. Extending the service life of bridges and determining the residual resource of bridges and bridge structures remain topical problems because capital restoration or construction of new bridges is a very time-consuming and costly process for any country in the world. An analysis of current foreign and domestic regulatory documents and research on the general state of the problem concerning the types of destruction, the impact of accidents, and external environmental factors were carried out. A large volume of information on the nature of occurrence and accumulation of damage in reinforced concrete bridge structures shows that the destruction of bridges is mainly influenced by production factors and environmental factors. The gradual destruction of the structure occurs as a result of the accumulation of various types of damage that arise from multiple repeated temporary loads, accidents, temperature changes, and the appearance of corrosion processes. To calculate the residual and total life of bridge el-ements, the crack resistance criterion was chosen, which takes into account the type of bridge construction, purpose, and operating conditions. As a determining parameter, the crack opening width was chosen for the elements of road and city bridges reinforced with tension rod rein-forcement, and the limit value of this parameter was established. In the absence of large failure statistics, it is suggested to use a probabilistic-physical approach to durability assessment. The main parameters of the probabilistic model with DM-failure distribution – are the average rate of change of the determining parameter and the coefficient of variation of the generalized deg-radation process. The results of the calculations show values that correspond to statistical and regulatory indicators. Qualitative collection of information on parameters of the destruction of bridges and bridge structures and a probabilistic-physical approach to assessing the real tech-nical condition of the object provide more accurate calculation results and allow for predicting the moment of reaching their maximum allowable value.","PeriodicalId":473328,"journal":{"name":"Matematičeskie mašiny i sistemy","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信